This undated page from GCHQ’s internal GCWiki describes the agency’s audit procedure to document compliance with the UK Human Rights Act: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.

This GCHQ slide taken from a presentation dates 27 November 2008 confirms that agency metadata repositories can be datamined for information relating to individuals within the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.

﻿Events analysis
SALAMANCA, HAUSTORIUM, THUGGEE, IMMINGLE
less intrusive than communications content
authorisation not needed for individuals in
the UK
necessity and proportionality st...

This 15 June 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column tackles the subject of partial information: see the Intercept article The Philosopher of Surveillance, 11 August 2015.

This 16 August 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, considers how analysts should tackle the situation where they cannot fully answer the questions they are tasked with: see the Intercept article The Philosopher of Surveillance, 11 August 2015.

This 29 May 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, gives a first person account of how an analyst became reconciled to the idea of total surveillance during a polygraph test: see the Intercept article The Philosopher of Surveillance, 11 August 2015.

This 30 November 2010 notice taken from the NSA’s internal newsletter SIDToday calls for an employee to write a regular ethics column as the “Socrates of SIGINT”: see the Intercept article The Philosopher of Surveillance, 11 August 2015.

This undated NSA technical document provides configuration information for TRAFFICTHIEF, the live alerts element of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.

This undated NSA technical document provides configuration instructions for DEEPDIVE, a system that can be integrated with XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.

﻿CONFIDENTIAL
(U//FOUO) DEEPDIVE
Configuration Read Me
(U) Overview
(C) The purpose of this document is to provide procedures to configure an XKEYSCORE server as a
DEEPDIVE server. DEEPD...

This GCHQ document from November 2008 provides a guide to the legal authorisations required for different forms of agency activity: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.

﻿UK CONFIDENTIAL Version 6, dated 11/08
Side l
The issue on GCVYeb is die definitive version; printed copies may be out of date. Terms are defined in the glossary at
http w.v ope rations^'po...

This undated GCHQ training document details the requirements for analysts engaged in the reverse engineering of commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.

This extract from a July 2008 NSA document describes Argentina as GCHQ’s “primary interest” in Latin America: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.

This small extract from a 2008 document, an interview with NSA Global Capabilities Manager for Countering Foreign Intelligence, names Israel as “the third most aggressive intelligence service against the US”: see the book No Place To Hide, 13 May 2014.

﻿Israel also targets us. On the one hand, the Israelis are extraordinarily good SIGINT
partners for us, but on the other, they target us to learn our positions on Middle East problems. A NIE (Nati...

This undated selection of seven NSA slides highlights the activities the agency regards as its “core secrets”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.

This NSA document from January 2013 lists the codenames of those agency activities sufficiently sensitive to qualify as “exceptionally controlled information”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.ah

This October 2005 article, taken from the internal NSA newsletter Foreign Affairs Digest, provides a brief history of the agency’s past and current relationship with its Turkish counterparts, which includes a staff of 40 NSA employees stationed in Ankara: see the Intercept article How the NSA Helped Turkey Kill Kurdish Rebels, 31 August 2014. Download […]

These GCHQ guidelines from 23 June 2010 describe procedures for operating mobile phones overseas which are not intended to be associated with agency activity: see the Intercept article NPR Is Laundering CIA Talking Points to Make You Scared of NSA Reporting, 12 August 2014.

This short extract from a GCHQ planning document from 2008 makes clear concerns about Israel’s “less desirable activities”: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.

﻿TOP SECRET STRAP 1
Israel. Policy makers remain deeply concerned over the potential threat that Israel
poses to a peaceful resolution of the Iran problem, and to some of Israel’s less
desirab...

This undated image, taken from NSA training materials, shows the role played by Executive Order 12333 in authorising the agency’s activities: see the Washington Post article Privacy watchdog’s next target: the least-known but biggest aspect of NSA surveillance, 23 July 2014.

This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.

This 2010 certification from the Director of National Intelligence and the Attorney General asserts that procedures are in place to ensure foreign intelligence gathering stays within the boundaries of the law by targeting people “who are reasonably believed to be outside the United States.” The breadth of the authority is, however, very wide, allowing surveillance […]

﻿SECRET//ORCON,NOFORN
CERTIFICATION OF THE DIRECTOR OF NATIONAL INTELLIGENCE AND THE
ATTORNEY GENERAL PURSUANT TO SUBSECTION 702(g) OF TfififFORpGN
INTELLIGENCE SURVEILLANCE ACT OF 1978, AS ...

This short extract from an NSA document shows that cooperation with Germany’s intelligence services went as far as providing the country’s domestic intelligence service, the Federal Office for the Protection of the Constitution (BfV), with access to XKeyScore: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.

﻿exchange.
[TS//SI//NF) Germany: Provision of XKEYSCORE software to the ES1V will
expand their ability to support NSA as we jointly prosecute CT targets.
Technical support forXKEYSCGRE will be...

This internal NSA post from 1 February 2006 describes the visit several agency personnel to bases in Germany: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.

﻿(U//FOUO) On. the Road Again: SID Team Visits Germany
Assistant Deputy Director for Analysis & Production (S2)
Run Date: 02/01/2006
(U//FOUO) After staying around headquarters for the las...

This post from the NSA intranet dated 6 April 2001 gives the reactions of staff to the announced closure of the Bad Aibling station in Bavaria (in the event, the NSA retained a presence at the base): see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.

﻿(U//FOUO) A Little Bad Aibling Nostalgia
FROM: Some DA Veterans
Unknown
Run Date: 06/04/2004
(U//FOUO) Once the closure of Bad Aibling Station (located in southern Bavaria in
Germany) b...

This undated internal NSA document illustrates the degrees of cooperation in the agency’s relationships with different foreign powers. “Tier A” and “Tier B” are elsewhere referred to as Second and Third Parties: see the book No Place To Hide, 13 May 2014.

This extract, part of an undated disclosure given to congress each year as required under the 2008 FISA Amendments Act, shows that the FISA Court only denied one application made by the US government over the course of 2012: see the book No Place To Hide, 13 May 2014.

﻿Page 129
r
Applications Made to the Foreign Intelligence Surveillance Court During Calendar
Year 2012 (section 107 of the Act, 50 U. S.C. § 1807)
During calendar year 2012, the Governmen...

This excerpt from a 2006 NSA memo written by the global resources manager of the International Security Issues (ISI) mission underlines the importance of data on energy resources, production and international investment to the agency: see the book No Place To Hide, 13 May 2014.

﻿Page 138
(U) NSA Washington Mission
(U) Regional
(TS//SI) ISI is responsible for 13 individual nation states in three continents. One
significant tie that binds all these countries togethe...